MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0dd29b79f25da5b91be94cc0c6139d39b90c6cc82fbe08010c5ea9eb4d7c5910. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 10


Intelligence 10 IOCs YARA 3 File information Comments

SHA256 hash: 0dd29b79f25da5b91be94cc0c6139d39b90c6cc82fbe08010c5ea9eb4d7c5910
SHA3-384 hash: 964e4fd017e810b1201cd4eb6a180d92a89413c716e98b7a5a3f207f224f5b18a7d395cc1c4fe284b037e3bc25444a9b
SHA1 hash: 97004025ddfb7f0e8a5f7e7c932aa86377223f38
MD5 hash: adc3316db42dd6467bcf339b96d13f68
humanhash: missouri-avocado-michigan-item
File name:aarch64
Download: download sample
File size:509'896 bytes
First seen:2025-06-29 05:08:39 UTC
Last seen:Never
File type: elf
MIME type:application/x-executable
ssdeep 6144:O/izeB+/ow3gK2lc5bvyI0vOHD6BZkDgn358cIF3RI5HkdY1FP98/8ecjfP:3BohHKTyfvOHD6ByD4WcIMkuDmEesP
TLSH T14AB41228EE4E38D1F3D1E3B8DA0A4BB1B05B79D0C166C1B2BA41E25D95EDDDEC5D0212
TrID 50.1% (.) ELF Executable and Linkable format (Linux) (4022/12)
49.8% (.O) ELF Executable and Linkable format (generic) (4000/1)
Magika elf
Reporter abuse_ch
Tags:elf

Intelligence


File Origin
# of uploads :
1
# of downloads :
87
Origin country :
DE DE
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creates directories
Verdict:
Unknown
Threat level:
  2.5/10
Confidence:
100%
Tags:
exploit gcc lolbin remote
Verdict:
Malicious
Uses P2P?:
true
Uses anti-vm?:
false
Architecture:
arm
Packer:
custom
Botnet:
unknown
Number of open files:
0
Number of processes launched:
0
Processes remaning?
false
Remote TCP ports scanned:
46697
Behaviour
no suspicious findings
Botnet C2s
TCP botnet C2(s):
not identified
UDP botnet C2(s):
type: 162.159.200.123:123
type: 130.239.18.158:6881
type: 176.125.139.123:6881
type: 89.207.71.47:6881
type: 188.42.55.92:6881
type: 178.215.232.114:6881
type: 89.168.101.75:6881
type: 178.69.209.93:6881
type: 141.145.201.29:6881
type: 185.186.197.211:6881
type: 216.87.68.106:6881
type: 109.128.8.136:6881
type: 66.27.124.244:6881
type: 67.215.246.10:6881
type: 91.142.154.225:6881
type: 195.20.19.216:6881
type: 220.124.58.245:6881
type: 31.37.208.39:6881
type: 78.148.65.157:6881
type: 82.126.57.56:6881
type: 142.154.127.218:6881
type: 79.7.154.107:6881
type: 95.32.165.95:6881
type: 89.142.5.41:6881
type: 211.75.136.210:6881
type: 73.89.21.84:6881
type: 142.171.58.199:6881
type: 77.173.204.230:6881
type: 43.156.107.175:6881
type: 129.146.73.26:6881
type: 192.227.221.84:6881
type: 209.141.40.204:6881
type: 144.217.72.98:6881
type: 51.15.20.12:6881
type: 51.15.117.118:6881
type: 142.171.214.89:6881
type: 18.221.7.72:6881
type: 35.163.251.58:6881
type: 75.119.138.164:6881
type: 45.159.2.108:6881
type: 167.99.72.189:6881
type: 54.214.62.31:6881
type: 18.188.31.0:6881
type: 18.218.241.3:6881
type: 35.155.156.153:6881
type: 5.199.240.209:6881
type: 18.220.82.190:6881
type: 178.64.63.75:6881
type: 103.99.129.58:6881
type: 125.228.237.2:6881
type: 176.97.51.140:6881
type: 178.162.174.178:28003
type: 95.168.162.161:42670
type: 173.230.130.111:6880
type: 45.203.154.94:6880
type: 45.203.212.13:6880
type: 69.164.203.179:6880
type: 45.56.122.13:6880
type: 178.162.173.231:28001
type: 178.162.173.16:28001
type: 178.162.174.235:28001
type: 178.162.174.70:28001
type: 178.162.173.155:28001
type: 130.239.18.158:8539
type: 178.162.173.203:28005
type: 178.162.173.160:28005
type: 195.154.185.217:25051
type: 135.181.238.57:50000
type: 135.181.227.244:50000
type: 37.27.103.248:50000
type: 130.239.18.158:8524
type: 178.162.173.164:28007
type: 212.7.202.40:28030
type: 46.232.211.15:12009
type: 178.162.173.32:28012
type: 178.162.174.55:28011
type: 195.154.185.217:24155
type: 87.140.110.241:23015
type: 45.87.251.132:28215
type: 178.162.173.154:28010
type: 178.162.173.138:28010
type: 193.107.112.58:51413
type: 81.6.45.199:51413
type: 31.20.58.64:51413
type: 89.67.2.57:51413
type: 176.191.193.204:51413
type: 5.130.152.219:51413
type: 201.209.212.204:51413
type: 73.141.92.206:56654
type: 46.232.211.245:58303
type: 46.232.211.211:18585
type: 46.232.211.65:63806
type: 178.162.174.84:28009
type: 176.31.106.44:58957
type: 211.106.17.105:40701
type: 68.150.14.54:54512
type: 90.215.61.94:35333
type: 185.203.56.70:13188
type: 46.232.210.97:64049
type: 178.162.174.47:28000
type: 130.239.18.158:8514
type: 49.48.85.114:21784
type: 91.161.224.249:4111
type: 45.159.94.37:60472
type: 111.90.47.18:11762
type: 72.21.17.97:25350
type: 185.203.56.53:25253
type: 188.165.251.156:55925
type: 178.162.173.194:28002
type: 89.149.202.17:28002
type: 45.137.83.168:43555
type: 73.56.97.17:6889
type: 81.22.177.104:6889
type: 72.172.219.19:20489
type: 115.22.118.161:46758
type: 91.117.16.39:39867
type: 54.211.14.111:20876
type: 207.6.27.11:39689
type: 222.99.177.160:8447
type: 217.128.89.26:16975
type: 128.0.104.15:8673
type: 24.49.57.18:18847
type: 220.253.166.179:9908
type: 185.149.91.153:20036
type: 49.229.213.48:37127
type: 116.118.162.20:42240
type: 190.106.222.8:5240
type: 174.3.237.12:49615
type: 189.11.166.119:46849
type: 119.149.212.225:7879
type: 31.202.31.148:44079
type: 144.76.175.153:28562
type: 209.35.95.58:5516
type: 209.121.229.241:30823
type: 37.187.17.177:54158
type: 197.94.55.111:27763
type: 188.165.198.24:50344
type: 185.232.130.18:20497
type: 46.238.140.254:6346
type: 85.10.30.120:52981
type: 178.42.158.8:47717
type: 146.59.3.81:10240
type: 152.53.105.61:10240
type: 194.29.101.83:10240
type: 95.214.53.172:1688
type: 5.135.138.99:31109
type: 54.209.131.199:6992
type: 43.240.149.123:32681
type: 54.36.168.18:46075
type: 137.74.200.136:10682
type: 188.165.241.169:50611
type: 176.31.183.98:37583
type: 185.149.91.137:51070
type: 5.158.28.67:42123
type: 152.53.45.107:7088
type: 62.182.86.86:52155
type: 148.71.110.123:6888
type: 61.62.99.71:27650
type: 45.128.27.249:49643
type: 89.233.232.253:25426
type: 185.90.225.50:20677
Status:
terminated
Behavior Graph:
%3 guuid=a2384d4e-1a00-0000-b204-b628570a0000 pid=2647 /usr/bin/sudo guuid=2bf74250-1a00-0000-b204-b6285e0a0000 pid=2654 /tmp/sample.bin guuid=a2384d4e-1a00-0000-b204-b628570a0000 pid=2647->guuid=2bf74250-1a00-0000-b204-b6285e0a0000 pid=2654 execve guuid=0b84a352-1a00-0000-b204-b628650a0000 pid=2661 /usr/bin/dash guuid=2bf74250-1a00-0000-b204-b6285e0a0000 pid=2654->guuid=0b84a352-1a00-0000-b204-b628650a0000 pid=2661 clone guuid=6761cb52-1a00-0000-b204-b628660a0000 pid=2662 /usr/bin/dash guuid=2bf74250-1a00-0000-b204-b6285e0a0000 pid=2654->guuid=6761cb52-1a00-0000-b204-b628660a0000 pid=2662 clone guuid=c314f452-1a00-0000-b204-b628670a0000 pid=2663 /usr/bin/dash guuid=2bf74250-1a00-0000-b204-b6285e0a0000 pid=2654->guuid=c314f452-1a00-0000-b204-b628670a0000 pid=2663 clone guuid=d6850853-1a00-0000-b204-b628690a0000 pid=2665 /usr/bin/dash guuid=2bf74250-1a00-0000-b204-b6285e0a0000 pid=2654->guuid=d6850853-1a00-0000-b204-b628690a0000 pid=2665 clone
Result
Threat name:
n/a
Detection:
malicious
Classification:
spre.troj.spyw
Score:
68 / 100
Signature
Executes the "crontab" command typically for achieving persistence
Multi AV Scanner detection for submitted file
Opens /sys/class/net/* files useful for querying network interface information
Sample reads /proc/mounts (often used for finding a writable filesystem)
Sample scans a subnet
Sample tries to persist itself using cron
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1724913 Sample: aarch64.elf Startdate: 29/06/2025 Architecture: LINUX Score: 68 40 178.162.173.117, 28010, 6881 LEASEWEB-NL-AMS-01NetherlandsNL Netherlands 2->40 42 87.212.171.176, 58094, 6881 VERSATELASfortheTrans-EuropeanTele2IPTransportbackbo Netherlands 2->42 44 102 other IPs or domains 2->44 50 Multi AV Scanner detection for submitted file 2->50 52 Sample scans a subnet 2->52 10 dash rm aarch64.elf 2->10         started        12 dash rm 2->12         started        signatures3 process4 process5 14 aarch64.elf sh 10->14         started        16 aarch64.elf 10->16         started        19 aarch64.elf sh 10->19         started        signatures6 21 sh crontab 14->21         started        25 sh 14->25         started        46 Opens /sys/class/net/* files useful for querying network interface information 16->46 48 Sample reads /proc/mounts (often used for finding a writable filesystem) 16->48 27 aarch64.elf 16->27         started        29 sh crontab 19->29         started        process7 file8 38 /var/spool/cron/crontabs/tmp.sVhmdI, ASCII 21->38 dropped 54 Sample tries to persist itself using cron 21->54 56 Executes the "crontab" command typically for achieving persistence 21->56 31 sh crontab 25->31         started        34 aarch64.elf 27->34         started        signatures9 process10 signatures11 58 Executes the "crontab" command typically for achieving persistence 31->58 36 aarch64.elf 34->36         started        process12
Threat name:
Linux.Trojan.SAgnt
Status:
Malicious
First seen:
2025-06-29 05:09:24 UTC
File Type:
ELF64 Little (Exe)
AV detection:
15 of 24 (62.50%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
linux
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:linux_generic_ipv6_catcher
Author:@_lubiedo
Description:ELF samples using IPv6 addresses
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:unixredflags3
Author:Tim Brown @timb_machine
Description:Hunts for UNIX red flags

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

elf 0dd29b79f25da5b91be94cc0c6139d39b90c6cc82fbe08010c5ea9eb4d7c5910

(this sample)

  
Delivery method
Distributed via web download

Comments